{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:22:06Z","timestamp":1743045726850,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166595"},{"type":"electronic","value":"9783030166601"}],"license":[{"start":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:00:00Z","timestamp":1555200000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16660-1_68","type":"book-chapter","created":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T16:06:56Z","timestamp":1555171616000},"page":"699-708","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Association Rule Hiding Using Firefly Optimization Algorithm"],"prefix":"10.1007","author":[{"given":"S.","family":"Sharmila","sequence":"first","affiliation":[]},{"given":"S.","family":"Vijayarani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,14]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining: Modeland Algorithms (2008). ISBN 0-387-70991-8","DOI":"10.1007\/978-0-387-70992-5"},{"key":"68_CR2","unstructured":"Jain, Y.K.: An efficient association rule hiding algorithm for privacy-preserving data mining. Int. J. Comput. Sci. Eng. 3(7), 2792\u20132798 (2011)"},{"key":"68_CR3","unstructured":"Nayak, G., Devi, S.: A survey on privacy preserving data mining: approaches and techniques. Int. J. Eng. Sci. Technol. 3(3), 2127\u20132133 (2011)"},{"issue":"1","key":"68_CR4","first-page":"6","volume":"1","author":"S Patel Tushar","year":"2013","unstructured":"Patel Tushar, S., Mayur, P., Dhara, L., Jahnvi, K., Piyusha, D., Ashish, P., Reecha, P.: Association an analytical study of various frequent itemset mining algorithms. Res. J. Comput. Inf. Technol. Sci. 1(1), 6\u20139 (2013). February Res. J. Computer & IT Sci. International Science Congress","journal-title":"Res. J. Comput. Inf. Technol. Sci."},{"key":"68_CR5","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2006","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Mateo (2006)"},{"key":"68_CR6","unstructured":"Saygin, Y., Verykios, V.S., Elmagarmid, A.K.: Privacy preserving association rule mining. In: Proceedings of the 2002 International (2002)"},{"key":"68_CR7","unstructured":"Schuster, A., Wolff, R., Gilburd, B.: Privacy preserving data mining on data grids in the presence of malicious participants. In: IEEE International Symposium on High Performance Distributed Computing - HPDC (2004)"},{"key":"68_CR8","first-page":"484","volume-title":"Lecture Notes in Computer Science","author":"Nan Zhang","year":"2004","unstructured":"Zhang, N., Wang, S., Zhao, W.: A new scheme on privacy preserving association rule mining. In: Principles of Data Mining and Knowledge Discovery \u2013 PKDD, vol. 3202, pp. 484\u2013495 (2004)"},{"key":"68_CR9","unstructured":"Otey, M.E., Wang, C., Parthasarathy, S., Veloso, A., Meria, W.: Mining frequent itemsets in distributed and dynamic databases. In: IEEE International Conference on Data Mining (2003)"},{"key":"68_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.eswa.2016.08.005","volume":"64","author":"MH Afshari","year":"2016","unstructured":"Afshari, M.H., Dehkordi, M.N., Akbari, M.: Association rule hiding using cuckoo optimization algorithm. Expert Syst. Appl. 64, 340\u2013351 (2016)","journal-title":"Expert Syst. Appl."},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Dehkordi, M.N., Badie, K., Zadeh, A.K.: A novel method for privacy preserving in association rule mining based on genetic algorithms. J. Softw. 4(6), 555\u2013562 (2009)","DOI":"10.4304\/jsw.4.6.555-562"},{"key":"68_CR12","unstructured":"Yang, X.S.: A discrete firefly algorithm for the multi-objective hybrid flow shop scheduling problems. IEEE Trans. Evol. Comput. 18(2), 301\u2013305 (2014)"},{"key":"68_CR13","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.cie.2014.08.016","volume":"76","author":"D Jia","year":"2014","unstructured":"Jia, D., Duan, X., Khan, M.K.: Binary artificial bee colony optimization using bitwise operation. Comput. Ind. Eng. 76, 360\u2013365 (2014)","journal-title":"Comput. Ind. Eng."},{"issue":"12","key":"68_CR14","first-page":"2087","volume":"31","author":"A Khan","year":"2014","unstructured":"Khan, A., Qureshi, M.S., Hussain, A.: Improved genetic algorithm approach for sensitive association rules hiding. World Appl. Sci. J. 31(12), 2087\u20132092 (2014)","journal-title":"World Appl. Sci. J."},{"issue":"7","key":"68_CR15","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1016\/j.compind.2013.04.011","volume":"64","author":"HQ Le","year":"2013","unstructured":"Le, H.Q., Arch-Int, S., Nguyen, H.X., Arch-Int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776\u2013784 (2013)","journal-title":"Comput. Ind."},{"key":"68_CR16","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving frequent itemset mining. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, vol. 14, pp. 43\u201354 (2002)"},{"issue":"1","key":"68_CR17","first-page":"0975","volume":"19","author":"S Vijayarani","year":"2011","unstructured":"Vijayarani, S., Tamilarasi, A., SeethaLakshmi, R.: Tabu search based association rule hiding. Int. J. Comput. Appl. 19(1), 0975\u20138887 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"68_CR18","first-page":"822","volume":"9","author":"F Yuan","year":"2014","unstructured":"Yuan, F., Chen, S., Liu, H.: Association rules mining on heart failure differential treatment based on the improved firefly algorithm. J. Comput. 9(4), 822\u2013830 (2014)","journal-title":"J. Comput."},{"key":"68_CR19","doi-asserted-by":"crossref","unstructured":"Neelima, S., Sathyanarayan, N., Murthy, P.K.: A novel multi-objective firefly algorithm for optimization of association rule mining (2017)","DOI":"10.1109\/ICBDACI.2017.8070877"},{"key":"68_CR20","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.eswa.2017.10.048","volume":"96","author":"A Telikani","year":"2017","unstructured":"Telikani, A., Shahbahrami, A.: Data sanitization in association rule mining: an analytical review. Expert Syst. 96, 406\u2013426 (2017)","journal-title":"Expert Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16660-1_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:15:26Z","timestamp":1567844126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16660-1_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,14]]},"ISBN":["9783030166595","9783030166601"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16660-1_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,14]]},"assertion":[{"value":"14 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA 2018","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}